The news archive provides access to past news stories from Communications of the ACM and other sources by date.
A growing number of companies are under pressure to protect sensitive data—and not just from hackers lurking outside the digital walls.
Desirable destinations at the fringes of the solar system can be hard to find.
Queensland University of Technology researchers have used a Sri Lankan elephant-tracking model to analyze the behavior of shoppers in Australia.
A U.S. National Science Foundation to five universities will support development of new clocking technologies, synchronization protocols, and control and sensing algorithms.
As NASA's Cassini spacecraft zooms toward Saturn's smoggy moon Titan for a targeted flyby on June 18, mission scientists are excitedly hoping to repeat a scientific tour de force that will provide valuable new insights into the…
At the 13th International Conference on Intelligent Autonomous Systems, the academic and industrial communities will discuss advances in agriculture and horticulture.
Researchers have developed a system that can track a football in three-dimensional space using low-frequency magnetic fields.
Data standards will be needed to facilitate traffic flow in the future, and government officials, engineers, and automakers are considering how to implement the technology.
Scientists and historians have performed a computational analysis of historical court records in London.
The hypothalamus is a small structure deep in the brain that, among other functions, coördinates sensory inputs—the appearance of a rival, for example—with instinctual behavioral responses.
As it stands, the touchscreen experience is confined to a flat, two-dimensional world.
MasterCard Inc, the world's second-largest debit and credit card company, sees business booming from selling data to retailers, banks, and governments on spending patterns found in the payments it processes, a top executive told…
Facial recognition and expression analysis technologies are maturing, and they're changing the face of marketing, healthcare, security, and more.
Cisco's 2014 Annual Security Report says about 1 million information security staffers and managers are needed to meet global demand for cybersecurity professionals.
The U.S. Defense Advanced Research Projects Agency's Plan X program aims to create technologies to help the Defense Department with cyberwarfare.
A Labrador Retriever named Diesel has become a canine that functions as a Cyber-Physical Search and Rescue Dog through a high-tech vest.
To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern to access your device.
When Steven P. Jobs led Apple, he created a core principle for the company's designers and engineers: stay fully focused on making great products.
By exploiting the tricks of quantum physics, researchers say they could build a worldwide network of atomic clocks that are much more accurate than any single clock in existence today.
The U.S. Federal Communications Commission is investigating deals in which some companies have agreed to pay Internet service providers for faster video delivery.
The US Supreme Court on Monday announced that it will consider a case involving a thorny free speech issue in the digital age: at what point does a statement made on social media sites like Facebook or Twitter cross the threshold…
The premiere event for robotic football (soccer) is scheduled for Brazil in July, and the University of Pennsylvania robotics lab will be seeking a fourth consecutive win.
Whether or not you caught wind of the excited announcement that "Eugene Goostman," a computer program ("chatbot") devised by Vladimir Veselov, Eugene Demchenko, and Sergey Ulasen, had passed the Turing Test this past week, there's…
The HTTP with Accountability protocol is designed to track the transmission of private data and enable the data owner to see how it is used online.
Augmented reality company Metaio is developing technology that could enable people to use all kinds of objects as interactive touch surfaces.
Computer scientists say they have developed the first fully automated computer program that pairs textual and visual data to learn visual concepts.
Despite legislation and warnings, online consumers remain susceptible to post-transaction marketing schemes.
Contract bridge requires major brainpower, and preferably an obsession with rules and strategy. So how to make it even geekier? Throw in some quantum mechanics to try to gain a competitive advantage.
Windows bug-testing software is providing insight into how stem cells determine which type of tissue to become.
As all things that are meant to be infallible, new technology being used in the 2014 World Cup has caused a stir.